Tuesday, August 13, 2019

Exam question Coursework Example | Topics and Well Written Essays - 2000 words - 1

Exam question - Coursework Example p-k encryption is more protected from cryptanalysis than conventional encryption. However, the security of any system depends on key length and the computational work engaged in breaking the cipher. In addition, the p-k encryption has superseded single key encryption. This is unlikely because of the increased processing power required . For conventional encryption, the same key is used for encryption and decryption. This means that it is feasible to develop a cryptographic system that relies on one key for encryption and a different key that is related for decryption. Additionally, these algorithms have the following important characteristics such as it is computationally infeasible to find out the decryption key when provided with only the knowledge of the algorithm and the encryption key. In addition to this some algorithms such as RSA, exhibits the following characteristics: Either of the two related keys can be used for encryption, while the other can also be used for decryption. 2. The implementation of a â€Å"covert channel† is a popular technique for subverting security safeguards. Two approaches to this method involve implementing â€Å"storage† or â€Å"timing† channels. Describe how such channels could be implemented in an actual system, and suggest ways in which the presence of such channels can be detected. Computers originally are made to ease the exchange of information. Latest information technology infrastructure has the central computers main framework ,while others do not develop into a personal computer. Additionally, the information revolve around and is opened in new avenues of IT ( Kim & Solomon, 2012).. This has also opened new possibilities for crimes. The attackers take advantage and use these opportunities to have passwords and therefore have the access to information and create disastrous effects on such networks and computers. For example: The nature of the computers has changed over the recent years..

No comments:

Post a Comment

Note: Only a member of this blog may post a comment.